Implementing a CMS. First Steps. A Case Study by. Raymond Sneddon, National Australia Group September Version: 1.

Size: px
Start display at page:

Download "Implementing a CMS. First Steps. A Case Study by. Raymond Sneddon, National Australia Group September 2008. Version: 1."

Transcription

1 Implementing a CMS First Steps A Case Study by, National Australia Group September 2008

2 Introduction...1 Spreadsheet Cells and Brain Cells...1 The Goal...2 Stage 1 Planning...2 Sponsorship...2 The Scope...2 Determining the Detail...2 Management Commitment....2 Product Selection....3 Assign Plenty of Time...3 Stage 2 Implementation...4 Avoid customisation...4 Test and Verify....4 Security...4 Capacity...4 Promotion to Production....5 Expectations...5 Conclusion....6

3 Introduction A Configuration Management System (CMS) is crucial for the successful management of IT services, infrastructure and assets. Without it, important service decisions can and will be flawed. The foundation of any CMS is the accuracy and availability of the source data and maintaining this accuracy and availability can be a difficult and challenging task. Multiple data sources and an ever changing environment contribute greatly to this challenge. The CMS employed by National Australia Group (NAG) did assist the Service Management teams with their day to day decisions. However, the ever increasing complexity of infrastructure and services, a high dependency on people - subject matter experts and manual processes - for the data input and little, if any, integration between various inputs meant that our CMS was, at best, inefficient, at worst, inaccurate. Automating the data collection and maintenance methods in regard to physical device CIs, software CI s and their relationships and holding this data in an appropriate CMDB would improve the efficiency and accuracy of the CMS. Spreadsheet Cells and Brain Cells The Change, Problem and Incident processes rely heavily on information regarding the services they help to support. Details regarding the technology, systems and processes used to support these services and how each relates to one another is crucial in maintaining service levels and continually improving the service. At NAG we held a lot of data in various, disparate data stores - physical CMDBs (spreadsheets databases document stores etc.) and virtual CMDBs, individual subject matter experts with a vast amount of experience and knowledge relating to the various services and technologies. While, in some areas there was a surfeit of information it could prove challenging to integrate the data. The continuous improvement of services added complexity, particularly within environments where the infrastructure was shared among services, and together with the wide spread data sources, it was often difficult to get a coherent and meaningful picture of the various end-to-end business processes, from a technology perspective. The diversity of data sources also resulted in conflict where differences were apparent between data sources, which was the reliable one? The overall result of this - ITIL processes suffered. Incidents could be categorized incorrectly with severity and impact being incorrectly diagnosed. Problems could take longer to resolve due to a lack of understanding of the complete end-to-end service. Incidents due to change were common as risk assessments were inaccurate. Twelve months ago NAG identified that while the processes did protect the services in the main, there were breaches in SLA s that could be eradicated through improving the data available to the CMS and a project to automate the discovery of CIs and integrate CMDBs was instigated. 1

4 The Goal To improve the quality of data provided to the CMS we determined that an accurate inventory of CIs was required. Initially these CIs would be limited to physical devices attached to our network and the software CIs that were hosted on the physical CIs and their relationships to each other. To achieve this, tools would be deployed that would automatically and regularly collect the required CI data. A new CMDB would be built to contain integrated data reconciled from the discovery tools and other data sources as required. This CMDB would hold key CI data, while a federated approach would allow more detailed information to be stored in other databases. This federated data would be accessible from the integrated CMDB giving us our initial goal - the single source of truth. On completion we would have a system on which we could further build enhancements to our CMS and achieve a secondary goal - the foundation for a fully integrated CMS. Stage 1 Planning Sponsorship The need to improve the CMS data was clear and gaining sponsorship was relatively easy. However, satisfying the budget requirements were challenging and compromises had to be negotiated. This had a major impact on what would eventually be the scope of the project. The Scope. Our requirements were to automate the collection of configuration data pertaining to technology components that supported the services that we provided to our business units. However, this in itself was not enough to determine the scope. Determining the consumers of the data and how they would gain access to it was a chief consideration. It was our conscious decision to collect data for the initial purpose of providing an inventory database. The data would be stored in a CMDB whose key requirement was to be able to integrate with existing technologies used to support our CMS. Integrating with other technologies at this stage was out of scope but ensuring that this functionality was available was critical to the future development of the system. Removing this requirement from the original scope allowed the project to quickly proceed. Determining the Detail. The level of detail to be contained within the CMDB was heavily debated. Determining the level of detail required was critical. Too much detail and the database(s) would be large and unmanageable, too little and vital information could be missed. People generally wanted to get as much detail as possible included. As our project made use of multiple data sources, both new and existing, and the initial scope was defined the main challenge was determining if the data was required in the integrated CMDB or if it was detail that could reside in a federated database. Management Commitment. The implementation of automated tools of any kind results in a degree of cultural change. Knocking down the walls of the technology silos can be challenging and without management support, nearly impossible. Ensuring the support of the management teams help promote this project and contributed to its success. 2

5 Product Selection. Several companies were engaged in initial discussion regarding the tools available to achieve our aims. The selection process we used looked at the following Current relationship with vendor Confidence in Professional Services Cost of tools and services Scope of discovery tools o Hardware o OS and application o Network Topology mapping Supports data federation Reporting capabilities Integration into CMS Once the product was selected a close relationship with the vendor was maintained to ensure that the deployment was successful. The vendor s profession services division was engaged to assist with the implementation. While we knew your systems and services, they knew their tool sets. Assign Plenty of Time. Collecting data from automated discovery tools is in itself a fairly quick and easy process. However, analysing the data and classifying discovered CIs and filtering out unwanted details takes time in planning and implementing. Identifying relationships between CIs and mapping them correctly to services is also a time consuming process. While tools can detect lines of communication through the infrastructure they cannot determine the relationship to the service provided. That requires manual effort and this too can take a considerable amount of time. However, once the initial mapping is complete it does not take too much resource to maintain the maps. 3

6 Stage 2 Implementation Avoid customisation. While the tools we deployed supported customisation, deviating from the tool s standards could complicate the various data mappings going forward. After determining what data was required an analysis of how this data related to the tool s data model was carried out. This analysis determined that our requirements would fit into the data model provided by the tools. Our recommendation is that if customisation cannot be avoided then ensure that it is kept to a minimum. It is a lot easier to maintain an out of the box solution. Test and Verify. During the implementation of the discovery tools it was quickly identified that a staged approach was required to ensure that data verification could be carried out easily and quickly. Discovering a specific CI category and correcting anomalies before progressing on to the next stage of discovery ensured that the collected data was accurate. Trying to validate the data collected from a single pass of our entire estate would have been difficult and time consuming. After collecting the data the reconciliation into the CMDB had to be tested. When multiple data sources are being used it is crucial that the correct order and priorities are assigned. Also, the reconciliation of data requires careful consideration regarding the unique key field on which data can be reconciled. At first serial numbers seemed to be the obvious choice, but it soon became apparent that this provided its own difficulties. In today s climate of virtualisation, several systems can have the same serial number thus negating the uniqueness of this attribute as a key field! Security Discovery tools require a high level of access to computer systems in order to collect the greatest amount of data and as such they can prove to be a security threat. The security of computer systems in any industry, not just the financial sector, is paramount and it was of great importance that we ensure no vulnerabilities were introduced. User account administration introduces its own problems maintaining restricted access and forced password changing policies. Collaboration with security administrators was undertaken in order to provide the best practical and compliant solution for our environment. Capacity There were two new discovery tools being deployed as part of this project. One would reside on a central system and would interrogate the network for attached devices while the other required the installation of a small program on each computer system that would interrogate its host and then send back data to a central administration system. While the latter could potentially impact service by using the resource of the hosting system, both of these tools would have an impact on our network traffic and therefore could potentially impact our business service. Collaboration with our network administration and capacity management teams, and execution of a series of test discoveries allowed us to show that, in both cases, the impact to existing services was negligible and the project could proceed. 4

7 Promotion to Production. At the conclusion of the project we had three new production systems. Two systems automatically discovered our IT infrastructure and recorded the results in their own, separate CMDBs, while the third system provided us with an integrated CMDB. Data from the two discovery CMDBs was being reconciled into the integrated CMDB along with data from two other manually maintained data sources. The integrated CMDB provides data that can be used to map technology to services, providing up-to-date views of relationships between the service and the CIs on which it depends. CIs can support multiple services and these relationships are also held in the integrated CMDB. This data is readily available, giving us our single source of truth. Expectations Now that the automated discovery tools and integrated CMDB have been deployed it is expected that the data will be used to assist change, problem and incident management processes. Change: Better understanding of change overlap Improve risk assessment Assist change owner in understanding dependencies Problem: Simplify association of CIs with Services Improved root cause analysis investigation Reduction in reoccurrences Incident: Improved view of overall service Improved impact analysis Aid to rapid recovery As our services become ever more complex the task of managing them becomes increasingly difficult. A failure of a single component may on the surface look quite innocuous but the knock on effect down stream could potentially be disastrous. The automated discovery and integrated CMDB give a complete end-to-end view of our services and CIs, in both directions (from a service to CI relationship and a CI to service relationship). There will not be any more surprises. If a CI is impacted it is easy to determine the services impacted. All of these improvements ultimately improve the levels of service delivered. 5

8 Conclusion. While the automation of discovery and the implementation of an integrated CMDB has resulted in an improved CMS this is not the end of the story. Our secondary goal was to lay the foundation on which we could build our CMS and I believe that we have achieved this also. There are still multiple CMDBs in use within NAG, and I am sure that this will always be the case. However, there is less reliance on manual processes, and the implementation of an integrated CMDB will allow us to reconcile the data from all of our CMDBs. It is our intention that key information taken from disparate CMDBs will be reconciled into the integrated CMDB while more detailed data will remain in the relevant CMDB. Users will make requests of the integrated CMDB and where more detail is required they can gain access to it through automated federation processes. Manual processes have not disappeared entirely as there is a limit to what data automated discovery tools can collect. Physical location, for example, is an attribute of a physical CI that, unless the CIs are electronically tagged, cannot be automatically generated. A recent data centre migration had carried out an extensive audit of one of our data centres. This audit provided valuable data in regard to machine locations. Although this data is manually maintained, the migration has ensured that the data is correct and a new management process will ensure that its accuracy is maintained. This process will in the coming months be rolled out into our other data centre which will result in an accurate database of all machine locations. This data too, will be reconciled into our integrated CMDB. The implementation of our integrated CMDB is not the end of our journey, just the beginning. While in its current guise the integrated CMDB provides benefit to other ITIL processes, the full potential can only be realised once the supporting systems for these processes are also integrated. Asset, Change, Problem and Incident systems will in due course be fully integrated, turning our integrated CMDB into an integrated CMS. 6

Integration Technologies Group (ITG) ITIL V3 Service Asset and Configuration Management Assessment Robert R. Vespe Page 1 of 19

Integration Technologies Group (ITG) ITIL V3 Service Asset and Configuration Management Assessment Robert R. Vespe Page 1 of 19 Service Asset and Configuration 1. Does the tool facilitate the registration and management of an organization s logical, physical and virtual Configuration Items (CIs)? For example, services, systems,

More information

The CMDB: The Brain Behind IT Business Value

The CMDB: The Brain Behind IT Business Value Thought Leadership white paper The CMDB: The Brain Behind IT Business Value By Gerry Roy, Director of Solutions Management for BMC Atrium and BMC Service Support, BMC Software TABLE OF CONTENTS Executive

More information

IT Asset Inventory and Outsourcing: The Value of Visibility

IT Asset Inventory and Outsourcing: The Value of Visibility BDNA WHITE PAPER IT Asset Inventory and Outsourcing: The Value of Visibility October 2007 bdnacorp.com U.S. Corporate Headquarters 650.625.9530 Europe, Middle East & Africa +33.1.42.27.10.71 Asia Pacific

More information

Service Support. 2005 Kasse Initiatives, LLC. ITIL Configuration Management - 1. version 2.0

Service Support. 2005 Kasse Initiatives, LLC. ITIL Configuration Management - 1. version 2.0 Service Support Configuration Management ITIL Configuration Management - 1 Goals of Configuration Management The goals of Configuration Management are to: Account for all the IT assets and configurations

More information

What Do You Need from a Configuration Management Database (CMDB)? BEST PRACTICES WHITE PAPER

What Do You Need from a Configuration Management Database (CMDB)? BEST PRACTICES WHITE PAPER What Do You Need from a Configuration Management Database (CMDB)? BEST PRACTICES WHITE PAPER Table of contents EXECUTIVE SUMMARY...1 WHY A CMDB?...2 The importance of configuration management...2 Goals...2

More information

ITIL A guide to service asset and configuration management

ITIL A guide to service asset and configuration management ITIL A guide to service asset and configuration management The goal of service asset and configuration management The goals of configuration management are to: Support many of the ITIL processes by providing

More information

GENERAL PLATFORM CRITERIA. General Platform Criterion Assessment Question

GENERAL PLATFORM CRITERIA. General Platform Criterion Assessment Question GENERAL PLATFORM CRITERIA SACM-V3-G-001 Comment: Does the tool use ITIL V3 process terms and align to ITIL V3 workflows and process integrations? SACM-V3-G-002 (OGC ISS 5.1.10) Access Controls Does the

More information

General Platform Criterion Assessment Question

General Platform Criterion Assessment Question Purpose: [E]nsure that the assets required to deliver services are properly controlled, and that accurate and reliable information about those assets is available when and where it is needed. (ST 4.3.1)

More information

The CMDB at the Center of the Universe

The CMDB at the Center of the Universe The CMDB at the Center of the Universe Reg Harbeck CA Wednesday, February 27 Session 5331 Purpose Clarify origin of CMDB concept and what it is Understand difference and equivalence between CMDB and Asset

More information

Service Asset & Configuration Management PinkVERIFY

Service Asset & Configuration Management PinkVERIFY -11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to

More information

ITSM Maturity Model. 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident management process exists

ITSM Maturity Model. 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident management process exists Incident ITSM Maturity Model 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident process exists Incident policies governing incident Incident urgency, impact and priority

More information

How to Deliver Measurable Business Value with the Enterprise CMDB

How to Deliver Measurable Business Value with the Enterprise CMDB How to Deliver Measurable Business Value with the Enterprise CMDB James Moore [email protected] Product Manager, Business Service, Netcool/Impact 2010 IBM Corporation Agenda What is a CMDB? What are CMDB

More information

Simple Service Modeling FAQs TrueSight Operations Management (BPPM) versions 9.5 and 9.6 11/31/2014

Simple Service Modeling FAQs TrueSight Operations Management (BPPM) versions 9.5 and 9.6 11/31/2014 QUESTION: Where on the BMC Communities site can I find best practice guidance for creating custom KMs and importing them into BPPM 9.5 CMA? ANSWER: https://communities.bmc.com/docs/doc-31482 QUESTION:

More information

Select the right configuration management database to establish a platform for effective service management.

Select the right configuration management database to establish a platform for effective service management. Service management solutions Buyer s guide: purchasing criteria Select the right configuration management database to establish a platform for effective service management. All business activities rely

More information

Software Asset Management (SAM) and ITIL Service Management - together driving efficiency

Software Asset Management (SAM) and ITIL Service Management - together driving efficiency Software Asset Management (SAM) and ITIL Service Management - together driving efficiency Ian Preskett MIET C.Eng. MBCS CITP Software Asset Management Consultant [email protected] Agenda

More information

7 Practical insights for IT Asset Management

7 Practical insights for IT Asset Management 7 Practical insights for IT Asset Management Tauneel McKay Director Swiss Reinsurance Company Ltd Subbarao Chaganty Principal Consultant Infosys Ltd RELATE MANAGE.. Context KNOW. Consolidate the IT Asset

More information

White Paper November 2006. BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

White Paper November 2006. BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management White Paper November 2006 BMC Best Practice Process Flows for Asset and ITIL Configuration Copyright 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names,

More information

Whitepaper. The Interlink Software Approach to. Service Configuration Management (SCM)

Whitepaper. The Interlink Software Approach to. Service Configuration Management (SCM) Whitepaper When the Only Constant is Change! The provision of a corporate-wide Configuration Management System (CMS) in a fortune 1000 organisation is not a trivial task, most organisations have grown

More information

CA Configuration Management Database (CMDB)

CA Configuration Management Database (CMDB) PRODUCT BRIEF: CA CMDB CA Configuration Management Database (CMDB) CA CONFIGURATION MANAGEMENT DATABASE (CMDB) HELPS YOU IDENTIFY AND UNDERSTAND THE DEPENDENCIES AND RELATIONSHIPS AMONG AND BETWEEN YOUR

More information

BIGFIX. BigFix and configuration management database solutions

BIGFIX. BigFix and configuration management database solutions BigFix and configuration management database solutions Configuration management databases (CMDB) have emerged as an important tool for understanding relationships between IT assets and their support for

More information

Bringing wisdom to ITSM with the Service Knowledge Management System

Bringing wisdom to ITSM with the Service Knowledge Management System Processes 415 Bringing wisdom to ITSM with the Service Knowledge Management System 7.3 Bringing wisdom to ITSM with the Service Knowledge Management System nowledge is a process of piling up facts; wisdom

More information

8 Tips for Winning the IT Asset Management Challenge START

8 Tips for Winning the IT Asset Management Challenge START Tips for Winning the IT Asset Management Challenge START A successful IT Asset Management (ITAM) program can help you lower your costs and increase your asset utilization. You benefit by avoiding unplanned

More information

Control Costs with a 4-Speed SACM Transmission

Control Costs with a 4-Speed SACM Transmission WHITE PAPER: Control Costs with a 4-Speed SACM Transmission Brent J. Knipfer Director ITSM Product Management CompuCom May 2012 Executive Summary IT executives are clamoring for more control over the physical

More information

Rob Addy. Author of Effective IT Service Management: To ITIL and beyond! (www.effectiveitsm.com)

Rob Addy. Author of Effective IT Service Management: To ITIL and beyond! (www.effectiveitsm.com) Rob Addy Author of Effective IT Service Management: To ITIL and beyond! (www.effectiveitsm.com) Are you sitting in the right session? Discover the truth about discovery Automated discovery was, and indeed

More information

CA Service Desk Manager

CA Service Desk Manager PRODUCT BRIEF: CA SERVICE DESK MANAGER CA Service Desk Manager CA SERVICE DESK MANAGER IS A VERSATILE, COMPREHENSIVE IT SUPPORT SOLUTION THAT HELPS YOU BUILD SUPERIOR INCIDENT AND PROBLEM MANAGEMENT PROCESSES

More information

The ITIL Foundation Examination

The ITIL Foundation Examination The ITIL Foundation Examination Sample Paper B, version 4.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have

More information

Problem Management Fermilab Process and Procedure

Problem Management Fermilab Process and Procedure Management Fermilab Process and Procedure Prepared for: Fermi National Laboratory June 12, 2009 Page 1 of 42 GENERAL Description Purpose Applicable to Supersedes This document establishes a Management

More information

SACM and CMDB Strategy and Roadmap. David Lowe ActionableITSM.com March 20, 2012

SACM and CMDB Strategy and Roadmap. David Lowe ActionableITSM.com March 20, 2012 SACM and CMDB Strategy and Roadmap David Lowe ActionableITSM.com March 20, 2012 Disclaimer The strategy and roadmap information presented here is generic by nature and based on a highly hypothetical use

More information

Extend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database.

Extend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database. IBM Service Management solutions and the service desk White paper Extend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database. December

More information

Which ITIL process or function deals with issues and questions about the use of services, raised by end users?

Which ITIL process or function deals with issues and questions about the use of services, raised by end users? 1 of 40 Which ITIL process or function deals with issues and questions about the use of services, raised by end users? A. Availability Management B. Service Level Management C. Problem Management D. Service

More information

EXIN IT Service Management Foundation based on ISO/IEC 20000

EXIN IT Service Management Foundation based on ISO/IEC 20000 Sample Exam EXIN IT Service Management Foundation Edition October 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing

More information

How To Monitor Hybrid It From A Hybrid Environment

How To Monitor Hybrid It From A Hybrid Environment IT Monitoring for the Hybrid Enterprise With a Look at ScienceLogic Perspective 2012 Neovise, LLC. All Rights Reserved. Report Published April, 2015 Hybrid IT Goes Mainstream Enterprises everywhere are

More information

How to make auto-discovery work; a dynamic data-driven alternative to the periodic trawl of Discovery and Dependency Mapping (DDM)

How to make auto-discovery work; a dynamic data-driven alternative to the periodic trawl of Discovery and Dependency Mapping (DDM) How to make auto-discovery work; a dynamic data-driven alternative to the periodic trawl of Discovery and Dependency Mapping (DDM) Look what people are saying, source Linkedin IT Service Management Forum:

More information

Configuration control ensures that any changes to CIs are authorized and implemented in a controlled manner.

Configuration control ensures that any changes to CIs are authorized and implemented in a controlled manner. ITIL Intermediate Capability Stream: RELEASE CONTROL AND VALIDATION (RCV) CERTIFICATE SCENARIO BOOKLET Scenario One A global company develops its own applications to support the business. The service transition

More information

ITIL Intermediate Capability Stream:

ITIL Intermediate Capability Stream: ITIL Intermediate Capability Stream: RELEASE, CONTROL AND VALIDATION (RCV) CERTIFICATE Sample Paper 1, version 5.1 Gradient Style, Complex Multiple Choice QUESTION BOOKLET Gradient Style Multiple Choice

More information

White Paper. Incident Management: A CA IT Service Management Process Map

White Paper. Incident Management: A CA IT Service Management Process Map White Paper Incident Management: A CA IT Service Management Process Map Peter Doherty Senior Consultant, Technical Service, CA, Inc. Peter Waterhouse Director, Product Marketing, Business Service Optimization,

More information

CMDB Essential to Service Management Strategy. All rights reserved 2007

CMDB Essential to Service Management Strategy. All rights reserved 2007 CMDB: Essential to the Service Management strategy Business Proposition: This white paper describes how the CMDB is an essential component of the IT Service Management Strategy, and why the FrontRange

More information

The ITIL Foundation Examination

The ITIL Foundation Examination The ITIL Foundation Examination Sample Paper A, version 5.1 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have

More information

NSSC Enterprise Service Desk Configuration Management Database (CMDB) Configuration Management Service Delivery Guide

NSSC Enterprise Service Desk Configuration Management Database (CMDB) Configuration Management Service Delivery Guide National Aeronautics and Space Administration NASA Shared Services Center Stennis Space Center, MS 39529-6000 www.nssc.nasa.gov NASA Shared Services Center Version 1.0 NSSC Enterprise Service Desk Configuration

More information

Problem Management: A CA Service Management Process Map

Problem Management: A CA Service Management Process Map TECHNOLOGY BRIEF: PROBLEM MANAGEMENT Problem : A CA Service Process Map MARCH 2009 Randal Locke DIRECTOR, TECHNICAL SALES ITIL SERVICE MANAGER Table of Contents Executive Summary 1 SECTION 1: CHALLENGE

More information

CONFIGURATION MANAGEMENT BEST-PRACTICE RECOMMENDATIONS. Sun Services White Paper May 2007. Abstract

CONFIGURATION MANAGEMENT BEST-PRACTICE RECOMMENDATIONS. Sun Services White Paper May 2007. Abstract BEST-PRACTICE RECOMMENDATIONS CONFIGURATION MANAGEMENT Sun Services White Paper May 2007 Abstract Modern IT organizations can have hundreds or thousands of servers supporting business users around the

More information

Service Catalog Management: A CA Service Management Process Map

Service Catalog Management: A CA Service Management Process Map TECHNOLOGY BRIEF: SERVICE CATALOG MANAGEMENT Catalog : A CA Process Map JULY 2009 Enrico Boverino SR PRINCIPAL CONSULTANT, TECHNICAL SALES ITIL SERVICE MANAGER ITAC CERTIFIED Table of Contents Executive

More information

Asset management guidelines

Asset management guidelines Asset management guidelines 1 IT asset management (ITAM) overview Objective Provide a single, integrated view of agency assets in order to allow agencies to identify the asset location and assess the potential

More information

SOLUTION WHITE PAPER. Align Change and Incident Management with Business Priorities

SOLUTION WHITE PAPER. Align Change and Incident Management with Business Priorities SOLUTION WHITE PAPER Align Change and Incident Management with Business Priorities Table of Contents Executive summary 1 the Need for Business aware Service support processes 2 The Challenge of Traditional

More information

CA CMDB Connector for z/os version 2.0

CA CMDB Connector for z/os version 2.0 PRODUCT SHEET CA CMDB Connector for z/os version 2.0 CA CMDB Connector for z/os version 2.0 CA CMDB Connector for z/os is the final piece in the puzzle to create an enterprise CMDB, providing you the ability

More information

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER CONTENTS ADAPTING TO THE CONSTANTLY CHANGING ENVIRONMENT....................... 1 THE FOUR KEY BENEFITS OF AUTOMATION..................................

More information

ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE

ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE CONFIGURATION MANAGEMENT PACK FEATURES Automated discovery of dependency relationships between services, systems and Oracle

More information

ITIL Roles Descriptions

ITIL Roles Descriptions ITIL Roles s Role Process Liaison Incident Analyst Operations Assurance Analyst Infrastructure Solution Architect Problem Manager Problem Owner Change Manager Change Owner CAB Member Release Analyst Test

More information

BUYER S GUIDE: PC INVENTORY AND SOFTWARE USAGE METERING TOOLS

BUYER S GUIDE: PC INVENTORY AND SOFTWARE USAGE METERING TOOLS BUYER S GUIDE: PC INVENTORY AND SOFTWARE USAGE METERING TOOLS A guide for identifying an IT/software asset management product that best meets the needs of your organization 200 West Mercer Street Suite

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Next-Generation IT Asset Management: Transform IT with Data-Driven ITAM

Next-Generation IT Asset Management: Transform IT with Data-Driven ITAM Sponsored by Next-Generation IT Asset Management: In This Paper IT Asset Management, one of the key pillars of IT, is currently highly siloed from related and dependent functions Next-generation ITAM provides

More information

Exam : EX0-100. Title : ITIL Foundation Certificate in IT Service Management. Ver : 08.01.06

Exam : EX0-100. Title : ITIL Foundation Certificate in IT Service Management. Ver : 08.01.06 Exam : EX0-100 Title : ITIL Foundation Certificate in IT Service Management Ver : 08.01.06 QUESTION 1 The successful diagnosis of a problem results in a Known Error. On the basis of this Known Error a

More information

IBM Maximo Asset Management for IT

IBM Maximo Asset Management for IT Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs and financial impact of IT assets with a single solution that tracks and manages your hardware, software

More information

Network Configuration Management

Network Configuration Management Network Configuration Management Contents Abstract Best Practices for Configuration Management What is Configuration Management? FCAPS Configuration Management Operational Issues IT Infrastructure Library

More information

Deploying the CMDB for Change & Configuration Management

Deploying the CMDB for Change & Configuration Management WHITE PAPER: CMDB, CHANGE & CONFIGURATION MANAGEMENT Deploying the CMDB for Change & Configuration Management MAY 2007 CA and BearingPoint Table of Contents Executive Summary SECTION 1 2 Pressures on IT

More information

CMDB Federation. DMTF Standards for Federating CMDBs and other Management Data Repositories

CMDB Federation. DMTF Standards for Federating CMDBs and other Management Data Repositories CMDB Federation DMTF Standards for Federating CMDBs and other Management Data Repositories Synopsis Many organizations base IT management on a configuration management system consisting of a configuration

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations Achieving Control: The Four Critical Success Factors of Change Management Technology Concepts & Business Considerations T e c h n i c a l W H I T E P A P E R Table of Contents Executive Summary...........................................................

More information

Release & Deployment Management

Release & Deployment Management 1. Does the tool facilitate the management of the full lifecycle of Release and Deployment Management? For example, planning, building, testing, quality assurance, scheduling and deployment? Comments:

More information

CA Service Desk Manager

CA Service Desk Manager DATA SHEET CA Service Desk Manager CA Service Desk Manager (CA SDM), on-premise or on-demand, is designed to help you prevent service disruptions, better manage change risks, and provides a 360-degree

More information

Configuration Management System:

Configuration Management System: True Knowledge of IT infrastructure Part of the SunView Software White Paper Series: Service Catalog Service Desk Change Management Configuration Management 1 Contents Executive Summary... 1 Challenges

More information

White Paper: AlfaPeople ITSM 2013. This whitepaper discusses how ITIL 3.0 can benefit your business.

White Paper: AlfaPeople ITSM 2013. This whitepaper discusses how ITIL 3.0 can benefit your business. White Paper: AlfaPeople ITSM 2013 This whitepaper discusses how ITIL 3.0 can benefit your business. Executive Summary Imagine trying to run a manufacturing business without a comprehensive and detailed

More information

Release and Deployment Management: A CA Service Management Process Map

Release and Deployment Management: A CA Service Management Process Map TECHNOLOGY BRIEF: RELEASE AND DEPLOYMENT MANAGEMENT Release and Deployment : A CA Service Process Map JULY 2009 Malcolm Ryder ARCHITECT CA SERVICES Table of Contents Executive Summary 1 SECTION 1: CHALLENGE

More information

BSM Transformation through CMDB Deployment. Streamlining the Integration of Change and Release Management

BSM Transformation through CMDB Deployment. Streamlining the Integration of Change and Release Management BSM Transformation through CMDB Deployment Streamlining the Integration of Change and Release Management Gordon Owens, Managing Consultant generatione Technologies Agenda Brief Introduction Building Blocks

More information

N(i) 2 WHITE PAPER on CHANGE MANAGEMENT

N(i) 2 WHITE PAPER on CHANGE MANAGEMENT on CHANGE MANAGEMENT ABOUT THIS... 2 IT AND CHANGE MANAGEMENT... 3 RESPONDING TO PERFORMANCE AND ACCOUNTABILITY DEMANDS...3 AN EMERGING NEED FOR CHANGE MANAGEMENT...3 DEFINING CHANGE MANAGEMENT... 4 WHAT

More information

Management (CSM) Capability

Management (CSM) Capability CDM Configuration Settings Management (CSM) Capability Department of Homeland Security National Cyber Security Division Federal Network Security Network & Infrastructure Security Table of Contents 1 PURPOSE

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

Why you need an Automated Asset Management Solution

Why you need an Automated Asset Management Solution solution white paper Why you need an Automated Asset Management Solution By Nicolas Renard, Support and Professional Services Manager, BMC France Table of Contents 1 OVERVIEW Automated Asset Discovery

More information

ITIL V3 - Managing Application and Infrastructure Changes

ITIL V3 - Managing Application and Infrastructure Changes ITIL V3: Managing Application and Infrastructure Changes > White paper Preface IT service providers need to offer services that deliver new business opportunities whilst increasing levels of availability,

More information

HP Change Configuration and Release Management (CCRM) Solution

HP Change Configuration and Release Management (CCRM) Solution HP Change Configuration and Release Management (CCRM) Solution HP Service Manager, HP Release Control, and HP Universal CMDB For the Windows Operating System Software Version: 9.30 Concept Guide Document

More information

Firewall Change Management

Firewall Change Management White Paper 2010 Firewall Change Management Improve IT Efficiency by Automating Firewall Change Workflow Processes w w w.sk yboxsecurity.com Executive Summary Firewall management has become a hot topic

More information

Improving Service Asset and Configuration Management with CA Process Maps

Improving Service Asset and Configuration Management with CA Process Maps TECHNOLOGY BRIEF: SERVICE ASSET AND CONFIGURATION MANAGEMENT MAPS Improving Service Asset and Configuration with CA Process Maps Peter Doherty CA TECHNICAL SALES Table of Contents Executive Summary SECTION

More information

IT Service Management Guiding Principles A Starter Set

IT Service Management Guiding Principles A Starter Set White Paper IT Service Management Guiding s A Starter Set Overview Purpose This paper briefly describes the concept of using Guiding s when designing ITIL processes. It then presents a starter set of Guiding

More information

WHITE PAPER. iet ITSM Enables Enhanced Service Management

WHITE PAPER. iet ITSM Enables Enhanced Service Management iet ITSM Enables Enhanced Service Management iet ITSM Enables Enhanced Service Management Need for IT Service Management The focus within the vast majority of large and medium-size companies has shifted

More information

Release and Deployment Management Software

Release and Deployment Management Software ( Bron: ITG, Integration Technologies Group; zie ook blz 13) (Service Transition) Release and Deployment Management Software 1. Does the tool facilitate the management of the full lifecycle of Release

More information

ITIL V3 and ISO/IEC 20000

ITIL V3 and ISO/IEC 20000 For IT Service Management ITIL V3 and ISO/IEC 20000 Jenny Dugmore and Sharon Taylor Alignment White Paper March 2008 ITIL V3 and ISO/IEC 20000 Background For some years the close relationship between ITIL

More information

Enterprise ITSM software

Enterprise ITSM software Enterprise ITSM software About vfire vfire is an Enterprise level IT Service Management Software tool developed by Alemba. As the successor to VMware s Service Manager product (formerly infraenterprise),

More information

Fermilab Computing Division Service Level Management Process & Procedures Document

Fermilab Computing Division Service Level Management Process & Procedures Document BMC Software Consulting Services Fermilab Computing Division Process & Procedures Document Client: Fermilab Date : 07/07/2009 Version : 1.0 1. GENERAL Description Purpose Applicable to Supersedes This

More information

Best Practices for Implementing Software Asset Management

Best Practices for Implementing Software Asset Management Best Practices for Implementing Software Asset Management Table of Contents I. The Case for Software Asset Management (SAM)............................ 2 II. Laying the Groundwork for SAM............................................

More information

Bocada White Paper Series: Improving Backup and Recovery Success with Bocada Enterprise. Benefits of Backup Policy Management

Bocada White Paper Series: Improving Backup and Recovery Success with Bocada Enterprise. Benefits of Backup Policy Management Bocada White Paper Series: Improving Backup and Recovery Success with Bocada Enterprise Why Policy Management Matters... 3 Data Protection Service Management: An Overview... 3 Policy Management s Role

More information

D6.1: Service management tools implementation and maturity baseline assessment framework

D6.1: Service management tools implementation and maturity baseline assessment framework D6.1: Service management tools implementation and maturity baseline assessment framework Deliverable Document ID Status Version Author(s) Due FedSM- D6.1 Final 1.1 Tomasz Szepieniec, All M10 (31 June 2013)

More information

Mapping the Technical Dependencies of Information Assets

Mapping the Technical Dependencies of Information Assets Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital

More information

Three Asset Lifecycle Management Fundamentals for Optimizing Cloud and Hybrid Environments

Three Asset Lifecycle Management Fundamentals for Optimizing Cloud and Hybrid Environments Three Asset Lifecycle Management Fundamentals for Optimizing Cloud and Hybrid Environments An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for BMC April 2011 IT & DATA MANAGEMENT RESEARCH,

More information

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER Regulatory compliance. Server virtualization. IT Service Management. Business Service Management. Business Continuity planning.

More information

Finding, Fixing and Preventing Data Quality Issues in Financial Institutions Today

Finding, Fixing and Preventing Data Quality Issues in Financial Institutions Today Finding, Fixing and Preventing Data Quality Issues in Financial Institutions Today FIS Consulting Services 800.822.6758 Introduction Without consistent and reliable data, accurate reporting and sound decision-making

More information

Self-Service SOX Auditing With S3 Control

Self-Service SOX Auditing With S3 Control Self-Service SOX Auditing With S3 Control The Sarbanes-Oxley Act (SOX), passed by the US Congress in 2002, represents a fundamental shift in corporate governance norms. As corporations come to terms with

More information

CDM Hardware Asset Management (HWAM) Capability

CDM Hardware Asset Management (HWAM) Capability CDM Hardware Asset Management (HWAM) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Table of Contents 1 PURPOSE AND SCOPE... 2 2 THREAT

More information

BMC Remedyforce Asset Management. Frequently Asked Questions

BMC Remedyforce Asset Management. Frequently Asked Questions BMC Remedyforce Frequently Asked Questions Table of Contents BMC Remedyforce 2 Overview 2 Frequently Asked Questions 2 Definitions 2 1. What is Configuration Management? 2 2. What is IT? 2 3. What is a

More information

ARE YOU IMPLEMENTING A CMDB OR A PROCESS?

ARE YOU IMPLEMENTING A CMDB OR A PROCESS? ARE YOU IMPLEMENTING A CMDB OR A PROCESS? Author : Gary Case, Principal Consultant, Pink Elephant Version : 1.0 Date : January 2010 1 EXECUTIVE SUMMARY Yeah! We are getting a Configuration Management Database

More information

The ITIL Foundation Examination

The ITIL Foundation Examination The ITIL Foundation Examination Sample Paper A, version 4.2 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have

More information

Creating and Maturing a Service Catalog

Creating and Maturing a Service Catalog Creating and Maturing a Service Catalog By Wendy Kuhn and Pam Erskine Third Sky, Inc. Introduction Developing a service catalog can seem like a simple marketing and communications activity or a daunting

More information

Automated Firewall Change Management. Ensure continuous compliance and reduce risk with secure change management workflows

Automated Firewall Change Management. Ensure continuous compliance and reduce risk with secure change management workflows Automated Firewall Change Management Ensure continuous compliance and reduce risk with secure change management workflows JANUARY 2015 Executive Summary Firewall management has become a hot topic among

More information

SEAMLESS DATA PUMP. Out-of-the-box, and across the cloud, real-time secure data and event level integration

SEAMLESS DATA PUMP. Out-of-the-box, and across the cloud, real-time secure data and event level integration SEAMLESS DATA PUMP Out-of-the-box, and across the cloud, real-time secure data and event level integration Seamless Technologies data pumps accelerate new or existing CMDB / CMS deployments and reduce

More information